Q
Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

How challenging is implementing BYOD in a UC environment?

What are some challenges of implementing BYOD in a UC environment? UC expert Jon Arnold explains the three high-level challenges organizations face with BYOD.

Implementing bring your own device (BYOD) policies has certainly gained some traction these days and can be explored...

from many angles. For this post, I'll cite three high-level challenges that businesses of any size will face when implementing BYOD. I hope you take this insight as a starting point for further research, as BYOD can have far-reaching implications for UC.

Realistic expectations of the economics

At first glance, BYOD looks like a money-saver since employees pay for their devices. IT may get a free ride at the beginning, but there will be many ongoing costs that will far outweigh the initial savings. Key additional costs include mobile data plans, integrating UC applications, device maintenance and lost, damaged or stolen devices. The business takes on a lot of responsibility with BYOD, and the associated costs may not be apparent once employees start bringing their mobile devices to work.

Supporting UC in mobile environments

As employees shift to a mobile-centric work style, mobile UC support will be essential. This relates directly to your overall policies for supporting BYOD since employee preferences for mobile devices will vary widely. Working backward, you need to be sure your UC platform integrates with the mobile operating systems your BYOD plans will support. If mobility is becoming the productivity mode of choice for your employees, your UC plans will not succeed unless they are closely tied to BYOD.

Respecting privacy

This is not a technology issue, but will very much impact how the technology around UC is used. For BYOD to be effective there has to be trust on both sides. Employers have to trust that employees will stay focused on work when mobile and manage company data responsibly. Conversely, employees must trust that employers will respect their personal privacy. Striking this balance requires effort -- it will not come easily and both sides have to keep working to ensure trust remains in place. Once you have that, your chances of success when implementing BYOD with UC will improve greatly.

Do you have a question for Jon Arnold or any of our other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)

Next Steps

Test your knowledge of BYOD

BYOD challenges that go beyond network security

Four BYOD challenges to consider before diving in

This was last published in May 2015

Dig Deeper on Mobile Unified Communications

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What do you think are some reasons for and/or against implementing BYOD in a UC environment?
Cancel
The need for IT oversight is obvious. Personal tech carries risks as severe as partying at a biker bar. But once past that, there seems little sense in anything but BYOD, especially for work in a UC environment. Much of the work is highly personal, many of the tools are already owned.

Beyond the obvious cost of replicating existing technology, these are usually tools of choice. I don't want ANY piece of equipment, I want to keep on using exactly the same tools I already own, use now, and learned on.

IT obviously has a lot of work ahead, but in the long run, BYOD has major cost benefits and it's eminently a more sensible approach.
Cancel

-ADS BY GOOGLE

SearchCRM

SearchNetworking

SearchSDN

SearchTelecom

SearchITChannel

Close